Sciweavers

3820 search results - page 317 / 764
» Bounded Model Debugging
Sort
View
ICFEM
2010
Springer
15 years 2 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...
IWSEC
2010
Springer
15 years 2 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
JETAI
2010
115views more  JETAI 2010»
15 years 2 months ago
From soft constraints to bipolar preferences: modelling framework and solving issues
Real-life problems present several kinds of preferences. We focus on problems with both positive and negative preferences, that we call bipolar preference problems. Although seemi...
Stefano Bistarelli, Maria Silvia Pini, Francesca R...
JMLR
2011
125views more  JMLR 2011»
14 years 11 months ago
Approximate Marginals in Latent Gaussian Models
We consider the problem of improving the Gaussian approximate posterior marginals computed by expectation propagation and the Laplace method in latent Gaussian models and propose ...
Botond Cseke, Tom Heskes
SIAMREV
2011
40views more  SIAMREV 2011»
14 years 7 months ago
A Mathematical Model for the Control and Eradication of a Wood Boring Beetle Infestation
We propose a mathematical model for an infestation of a wooded area by a beetle species in which the larvae develop deep in the wood of living trees. Due to the difficulties of det...
Stephen A. Gourley, Xingfu Zou